IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://login.steamp
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 72 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FD1000
unkown
page execute and read and write
malicious
F60000
direct allocation
page read and write
57E0000
remote allocation
page read and write
459F000
stack
page read and write
4D21000
heap
page read and write
150E000
stack
page read and write
15B7000
heap
page read and write
14CC000
stack
page read and write
1604000
heap
page read and write
52E0000
direct allocation
page execute and read and write
12A3000
unkown
page execute and read and write
C3C000
stack
page read and write
41DF000
stack
page read and write
3A9E000
stack
page read and write
148A000
unkown
page execute and read and write
15CE000
heap
page read and write
449E000
stack
page read and write
471E000
stack
page read and write
311F000
stack
page read and write
3F9E000
stack
page read and write
4C1E000
stack
page read and write
FD0000
unkown
page readonly
4A9F000
stack
page read and write
4D21000
heap
page read and write
15F6000
heap
page read and write
57E0000
remote allocation
page read and write
15BF000
heap
page read and write
177E000
stack
page read and write
3D1E000
stack
page read and write
4D21000
heap
page read and write
5310000
direct allocation
page execute and read and write
15CE000
heap
page read and write
391F000
stack
page read and write
4D21000
heap
page read and write
3A5F000
stack
page read and write
F60000
direct allocation
page read and write
15E0000
heap
page read and write
3E5E000
stack
page read and write
5ADE000
stack
page read and write
5310000
direct allocation
page execute and read and write
4D21000
heap
page read and write
5330000
direct allocation
page execute and read and write
409F000
stack
page read and write
15F5000
heap
page read and write
F60000
direct allocation
page read and write
F4E000
stack
page read and write
445E000
stack
page read and write
57E0000
remote allocation
page read and write
4D21000
heap
page read and write
161A000
heap
page read and write
4ADE000
stack
page read and write
12D8000
unkown
page execute and read and write
56CE000
stack
page read and write
E70000
heap
page read and write
40DE000
stack
page read and write
F60000
direct allocation
page read and write
5310000
direct allocation
page execute and read and write
37DF000
stack
page read and write
187F000
stack
page read and write
36DE000
stack
page read and write
359E000
stack
page read and write
11C3000
unkown
page execute and read and write
5310000
direct allocation
page execute and read and write
F60000
direct allocation
page read and write
F60000
direct allocation
page read and write
158E000
heap
page read and write
158A000
heap
page read and write
331F000
stack
page read and write
495F000
stack
page read and write
148B000
unkown
page execute and write copy
FBE000
stack
page read and write
4D21000
heap
page read and write
3F5F000
stack
page read and write
57CF000
stack
page read and write
45DE000
stack
page read and write
435E000
stack
page read and write
12CF000
unkown
page execute and read and write
15C1000
heap
page read and write
15B7000
heap
page read and write
4D21000
heap
page read and write
F50000
heap
page read and write
3BDE000
stack
page read and write
F60000
direct allocation
page read and write
D90000
heap
page read and write
F60000
direct allocation
page read and write
12E6000
unkown
page execute and write copy
4D21000
heap
page read and write
15CE000
heap
page read and write
15C1000
heap
page read and write
15E0000
heap
page read and write
F60000
direct allocation
page read and write
161A000
heap
page read and write
F00000
heap
page read and write
5A7E000
stack
page read and write
355F000
stack
page read and write
341F000
stack
page read and write
F60000
direct allocation
page read and write
51DE000
stack
page read and write
544D000
stack
page read and write
12E5000
unkown
page execute and write copy
1570000
direct allocation
page read and write
15E3000
heap
page read and write
554D000
stack
page read and write
421E000
stack
page read and write
4D21000
heap
page read and write
52DF000
stack
page read and write
3B9F000
stack
page read and write
4D21000
heap
page read and write
4D20000
heap
page read and write
519D000
stack
page read and write
3E1F000
stack
page read and write
D3D000
stack
page read and write
F60000
direct allocation
page read and write
1604000
heap
page read and write
4BDF000
stack
page read and write
1651000
heap
page read and write
EDE000
stack
page read and write
582E000
stack
page read and write
F60000
direct allocation
page read and write
15BF000
heap
page read and write
481F000
stack
page read and write
5355000
trusted library allocation
page read and write
1657000
heap
page read and write
F05000
heap
page read and write
15CA000
heap
page read and write
369F000
stack
page read and write
1610000
heap
page read and write
15C9000
heap
page read and write
3CDF000
stack
page read and write
592D000
stack
page read and write
15C9000
heap
page read and write
4D21000
heap
page read and write
12E5000
unkown
page execute and read and write
5340000
direct allocation
page execute and read and write
4D21000
heap
page read and write
51A0000
direct allocation
page read and write
F77000
heap
page read and write
FD1000
unkown
page execute and write copy
46DF000
stack
page read and write
15E3000
heap
page read and write
568F000
stack
page read and write
4D21000
heap
page read and write
1580000
heap
page read and write
5310000
direct allocation
page execute and read and write
4D21000
heap
page read and write
5300000
direct allocation
page execute and read and write
381E000
stack
page read and write
F70000
heap
page read and write
4D21000
heap
page read and write
15E0000
heap
page read and write
15B3000
heap
page read and write
531E000
stack
page read and write
1030000
unkown
page execute and read and write
558E000
stack
page read and write
5160000
trusted library allocation
page read and write
321F000
stack
page read and write
F60000
direct allocation
page read and write
154E000
stack
page read and write
15C8000
heap
page read and write
4D21000
heap
page read and write
5310000
direct allocation
page execute and read and write
161A000
heap
page read and write
4D21000
heap
page read and write
FD0000
unkown
page read and write
1570000
direct allocation
page read and write
485E000
stack
page read and write
5320000
direct allocation
page execute and read and write
15CE000
heap
page read and write
395E000
stack
page read and write
1550000
heap
page read and write
5BDF000
stack
page read and write
4D21000
heap
page read and write
597D000
stack
page read and write
F60000
direct allocation
page read and write
165B000
heap
page read and write
499E000
stack
page read and write
15E3000
heap
page read and write
1610000
heap
page read and write
15E0000
heap
page read and write
4D1F000
stack
page read and write
52F0000
direct allocation
page execute and read and write
15E3000
heap
page read and write
4D30000
heap
page read and write
431F000
stack
page read and write
345E000
stack
page read and write
There are 175 hidden memdumps, click here to show them.